Dell PowerSwitch S5000 User manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S5000 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell 9.10(0.1) Configuration Guide for
the S5000 Switch
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how
to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property
laws. Dell and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and
names mentioned herein may be trademarks of their respective companies.
2016 - 05
Rev. A00
Contents
1 About this Guide..................................................................................................................... 39
Audience.................................................................................................................................... 39
Conventions.............................................................................................................................. 39
Related Documents.................................................................................................................40
2 Configuration Fundamentals............................................................................................... 41
Accessing the Command Line...............................................................................................41
CLI Modes.................................................................................................................................. 42
Navigating CLI Modes........................................................................................................43
Port Numbering Convention................................................................................................. 45
The do Command....................................................................................................................46
The no Command....................................................................................................................47
Obtaining Help..........................................................................................................................47
Entering and Editing Commands..........................................................................................48
Command History....................................................................................................................49
Filtering show Command Outputs.......................................................................................49
Multiple Users in Configuration Mode................................................................................. 51
3 Getting Started........................................................................................................................52
Accessing Ports.........................................................................................................................52
Accessing the RJ-45/RS-232 Console Port....................................................................... 52
Pin Assignments........................................................................................................................53
Accessing the CLI Interface and Running Scripts Using SSH..........................................53
Entering CLI commands Using an SSH Connection...................................................54
Executing Local CLI Scripts Using an SSH Connection............................................. 54
Default Configuration..............................................................................................................55
Accessing the USB-B Console Port......................................................................................55
Booting Process........................................................................................................................55
Enter the Initial Configuration Information........................................................................ 58
Configuring the Enable Password........................................................................................ 58
Configuring a Host Name.......................................................................................................59
Navigating CLI Modes............................................................................................................. 59
Default Configuration..............................................................................................................59
Configuring Layer 2 (Data Link) Mode................................................................................. 59
Accessing the System Remotely...........................................................................................60
Configure the Management Port IP Address..................................................................... 60
Configure a Management Route...........................................................................................61
Configuring a Username and Password.............................................................................. 61
3
Creating a Port-based VLAN.................................................................................................. 61
Assigning Interfaces to a VLAN..............................................................................................62
Assigning an IP Address to a VLAN....................................................................................... 62
Connect the S5000 to the Network.................................................................................... 63
Configure File Management.................................................................................................. 63
Copying Files to and from the System.................................................................................63
Important Points to Remember...................................................................................... 64
Mounting an NFS File System................................................................................................ 64
Important Points to Remember.......................................................................................65
Saving the Running-Configuration.......................................................................................66
Viewing Files.............................................................................................................................. 67
View Configuration Files.........................................................................................................68
Compressing Configuration Files......................................................................................... 68
Managing the File System........................................................................................................71
Enabling Software Features on Devices Using a Command Option.............................72
View Command History.......................................................................................................... 73
Upgrading and Downgrading Dell Networking OS...........................................................74
Verify Software Images Before Installation......................................................................... 74
Using HTTP for File Transfers.................................................................................................75
4 Switch Management.............................................................................................................. 77
Configuring Privilege Levels................................................................................................... 77
Creating a Custom Privilege Level.................................................................................. 77
Removing a Command from EXEC Mode...........................................................................77
Moving a Command from EXEC Privilege Mode to EXEC Mode................................... 78
Allowing Access to CONFIGURATION Mode Commands.............................................. 78
Allowing Access to the Following Modes........................................................................... 78
Applying a Privilege Level to a Username...........................................................................80
Applying a Privilege Level to a Terminal Line.....................................................................80
Configuring Logging................................................................................................................81
Log Messages in the Internal Buffer..................................................................................... 81
Configuration Task List for System Log Management................................................81
Disabling System Logging................................................................................................ 82
Sending System Messages to a Syslog Server..............................................................82
Configuring a UNIX System as a Syslog Server..................................................................82
Track Login Activity..................................................................................................................83
Restrictions for Tracking Login Activity......................................................................... 83
Configuring Login Activity Tracking............................................................................... 83
Display Login Statistics......................................................................................................84
Limit Concurrent Login Sessions.......................................................................................... 85
Restrictions for Limiting the Number of Concurrent Sessions.................................86
Configuring Concurrent Session Limit.......................................................................... 86
4
Enabling the System to Clear Existing Sessions...........................................................86
Changing System Logging Settings......................................................................................87
Display the Logging Buffer and the Logging Configuration...........................................88
Configuring a UNIX Logging Facility Level......................................................................... 89
Synchronizing Log Messages................................................................................................ 90
Enabling Timestamp on Syslog Messages...........................................................................91
File Transfer Services................................................................................................................91
Configuration Task List for File Transfer Services........................................................ 91
Enabling the FTP Server.................................................................................................... 92
Configuring FTP Server Parameters............................................................................... 92
Configuring FTP Client Parameters................................................................................ 93
Terminal Lines...........................................................................................................................93
Denying and Permitting Access to a Terminal Line.................................................... 94
Configuring Login Authentication for Terminal Lines......................................................94
Setting Time Out of EXEC Privilege Mode.......................................................................... 95
Using Telnet to get to Another Network Device...............................................................96
Lock CONFIGURATION Mode...............................................................................................97
Viewing the Configuration Lock Status......................................................................... 97
View the Configuration Lock Status.....................................................................................98
Recovering from a Forgotten Password............................................................................. 98
Recovering from a Forgotten Enable Password................................................................99
Recovering from a Failed Start.............................................................................................. 99
5 802.1ag................................................................................................................................... 101
Ethernet CFM...........................................................................................................................101
Maintenance Domains.......................................................................................................... 102
Maintenance Points............................................................................................................... 103
Maintenance End Points....................................................................................................... 103
Implementation Information............................................................................................... 104
Configuring the CFM.............................................................................................................104
Related Configuration Tasks.......................................................................................... 105
Enabling Ethernet CFM......................................................................................................... 105
Creating a Maintenance Domain........................................................................................ 105
Creating a Maintenance Association..................................................................................106
Create Maintenance Points..................................................................................................106
Creating a Maintenance End Point...............................................................................106
Creating a Maintenance Intermediate Point...............................................................107
Displaying the MP Databases......................................................................................... 107
Setting the MP Database Persistence...........................................................................108
Continuity Check Messages.................................................................................................108
Enabling CCM................................................................................................................... 109
Enabling Cross-Checking............................................................................................... 110
5
Sending Loopback Messages and Responses.................................................................. 110
Sending Linktrace Messages and Responses.................................................................... 111
Caching Link Trace........................................................................................................... 112
Enabling CFM SNMP Traps....................................................................................................113
Displaying Ethernet CFM Statistics......................................................................................114
6 802.1X..................................................................................................................................... 116
The Port-Authentication Process........................................................................................118
EAP over RADIUS....................................................................................................................120
RADIUS Attributes for 802.1 Support............................................................................120
Configuring 802.1X................................................................................................................ 120
Related Configuration Tasks...........................................................................................121
Important Points to Remember..................................................................................... 121
Enabling 802.1X...................................................................................................................... 122
Configuring MAC addresses for a do1x Profile................................................................ 124
Configuring Request Identity Re-Transmissions............................................................. 124
Configuring a Quiet Period after a Failed Authentication..............................................125
Forcibly Authorizing or Unauthorizing a Port.................................................................. 126
Re-Authenticating a Port...................................................................................................... 127
Configuring Timeouts........................................................................................................... 128
Configuring Dynamic VLAN Assignment with Port Authentication.............................129
Guest and Authentication-Fail VLANs................................................................................130
Configuring a Guest VLAN.............................................................................................. 131
Configuring an Authentication-Fail VLAN................................................................... 131
Configuring dot1x Profile .....................................................................................................133
Configuring the Static MAB and MAB Profile ...................................................................133
Configuring Critical VLAN ....................................................................................................134
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory
(CAM)..........................................................................................................................................136
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................... 136
Guidelines for Configuring ACL VLAN Groups.................................................................137
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..138
Configuring ACL VLAN Groups......................................................................................138
Configuring FP Blocks for VLAN Parameters..............................................................139
Viewing CAM Usage.............................................................................................................. 140
Allocating FP Blocks for VLAN Processes..........................................................................141
8 Access Control Lists (ACLs)................................................................................................ 143
IP Access Control Lists (ACLs)............................................................................................. 144
CAM Allocation and CAM Optimization............................................................................ 144
User Configurable CAM Allocation...............................................................................145
6
CAM Optimization............................................................................................................145
Test CAM Usage................................................................................................................145
View CAM-ACL Settings..................................................................................................146
View CAM Usage.............................................................................................................. 148
QoS CAM Region Limitation.......................................................................................... 148
Implementing ACLs on Dell Networking OS....................................................................149
ACLs and VLANs................................................................................................................149
ACL Optimization............................................................................................................. 149
Determine the Order in which ACLs are Used to Classify Traffic.......................... 149
IP Fragment Handling............................................................................................................150
IP Fragments ACL Examples........................................................................................... 151
Layer 4 ACL Rules Examples...........................................................................................151
Configure a Standard IP ACL................................................................................................152
Configuring a Standard IP ACL Filter............................................................................ 153
Configure an Extended IP ACL............................................................................................ 154
Configuring Filters with a Sequence Number............................................................ 154
Configuring Filters Without a Sequence Number......................................................155
Established Flag.......................................................................................................................156
Configure Layer 2 and Layer 3 ACLs.................................................................................. 156
Assign an IP ACL to an Interface..........................................................................................157
Applying an IP ACL............................................................................................................157
Counting ACL Hits............................................................................................................158
Configure Ingress ACLs.........................................................................................................158
Configure Egress ACLs..........................................................................................................159
Applying Egress Layer 3 ACLs (Control-Plane).......................................................... 160
Configure ACLs to Loopback.............................................................................................. 160
Applying an ACL on Loopback Interfaces......................................................................... 161
IP Prefix Lists............................................................................................................................162
Implementation Information..........................................................................................162
Configuration Task List for Prefix Lists.........................................................................163
Creating a Prefix List.............................................................................................................. 163
Creating a Prefix List Without a Sequence Number..................................................164
Viewing Prefix Lists...........................................................................................................165
Applying a Prefix List for Route Redistribution...........................................................165
Applying a Filter to a Prefix List (OSPF)........................................................................ 166
ACL Resequencing................................................................................................................. 167
Resequencing an ACL or Prefix List.............................................................................. 167
Route Maps..............................................................................................................................169
Implementation Information..........................................................................................169
Important Points to Remember.................................................................................... 169
Configuration Task List for Route Maps...................................................................... 169
Creating a Route Map......................................................................................................170
7
Configure Route Map Filters........................................................................................... 171
Configuring Match Routes..............................................................................................172
Configuring Set Conditions............................................................................................ 173
Configure a Route Map for Route Redistribution...................................................... 175
Configure a Route Map for Route Tagging.................................................................175
Continue Clause............................................................................................................... 176
9 Bidirectional Forwarding Detection (BFD).......................................................................177
How BFD Works......................................................................................................................178
BFD Packet Format.................................................................................................................179
BFD Sessions............................................................................................................................181
BFD Three-Way Handshake................................................................................................. 181
Session State Changes.......................................................................................................... 183
Important Points to Remember.....................................................................................183
Configure BFD........................................................................................................................ 184
Configure BFD for Physical Ports..................................................................................184
Configure BFD for Static Routes................................................................................... 187
Configure BFD for OSPF................................................................................................. 189
Configure BFD for IS-IS...................................................................................................193
Configure BFD for BGP................................................................................................... 196
Configuring Protocol Liveness......................................................................................203
Troubleshooting BFD............................................................................................................203
10 Border Gateway Protocol IPv4 (BGPv4)........................................................................ 205
Autonomous Systems (AS)...................................................................................................206
Sessions and Peers................................................................................................................ 209
Establish a Session........................................................................................................... 209
Route Reflectors.....................................................................................................................210
Communities........................................................................................................................... 211
BGP Attributes..........................................................................................................................211
Best Path Selection Criteria.............................................................................................211
Weight.......................................................................................................................................213
Local Preference.....................................................................................................................214
Multi-Exit Discriminators (MEDs)...................................................................................214
Origin.........................................................................................................................................215
AS Path......................................................................................................................................216
Next Hop.................................................................................................................................. 216
Multiprotocol BGP..................................................................................................................217
Implement BGP with Dell Networking OS........................................................................ 217
Additional Path (Add-Path) Support..............................................................................217
Advertise IGP Cost as MED for Redistributed Routes............................................... 218
Ignore Router-ID for Some Best-Path Calculations................................................. 219
8
Four-Byte AS Numbers....................................................................................................219
AS4 Number Representation..........................................................................................219
AS Number Migration............................................................................................................ 221
BGP4 Management Information Base (MIB).....................................................................223
Important Points to Remember.................................................................................... 223
Configuration Information...................................................................................................224
BGP Configuration...........................................................................................................224
Enabling BGP...........................................................................................................................225
Configuring AS4 Number Representations...................................................................... 229
Configuring Peer Groups......................................................................................................231
Configuring BGP Fast Fall-Over..........................................................................................234
Configuring Passive Peering................................................................................................ 235
Maintaining Existing AS Numbers During an AS Migration........................................... 236
Allowing an AS Number to Appear in its Own AS Path.................................................. 237
Enabling Graceful Restart.....................................................................................................238
Enabling Neighbor Graceful Restart.................................................................................. 239
Filtering on an AS-Path Attribute........................................................................................240
Regular Expressions as Filters........................................................................................ 241
Filtering BGP Routes Using AS-PATH Information......................................................... 243
Redistributing Routes............................................................................................................244
Enabling Additional Paths.....................................................................................................245
Configuring IP Community Lists.........................................................................................245
Filtering Routes with Community Lists..............................................................................247
Manipulating the COMMUNITY Attribute..........................................................................247
Changing MED Attributes.....................................................................................................249
Changing the LOCAL_PREFERENCE Attribute................................................................ 249
Configuring the local System or a Different System to be the Next Hop for
BGP-Learned Routes.............................................................................................................250
Changing the WEIGHT Attribute......................................................................................... 251
Enabling Multipath..................................................................................................................251
Filtering BGP Routes Using Route Maps........................................................................... 252
Filtering BGP Routes Using AS-PATH Information......................................................... 253
Filtering BGP Routes..............................................................................................................253
Filtering BGP Routes Using Route Maps......................................................................255
Filtering BGP Routes Using AS-PATH Information................................................... 256
Configuring BGP Route Reflectors.....................................................................................257
Aggregating Routes............................................................................................................... 257
Configuring BGP Confederations.......................................................................................258
Enabling Route Flap Dampening........................................................................................ 259
Changing BGP Timers........................................................................................................... 261
Enabling BGP Neighbor Soft-Reconfiguration................................................................262
Route Map Continue............................................................................................................. 263
9
Match a Clause with a Continue Clause..................................................................... 264
Set a Clause with a Continue Clause...........................................................................264
Enabling MBGP Configurations.......................................................................................... 264
BGP Regular Expression Optimization.............................................................................. 265
Debugging BGP......................................................................................................................265
Storing Last and Bad PDUs.............................................................................................266
Capturing PDUs................................................................................................................ 267
PDU Counters...................................................................................................................268
Sample Configurations......................................................................................................... 268
11 Bare Metal Provisioning (BMP).........................................................................................278
Prerequisites............................................................................................................................278
Restrictions.............................................................................................................................. 279
Reconfiguring Jumpstart and Normal Modes..................................................................279
Jumpstart Mode.....................................................................................................................280
DHCP Server/Configuration.......................................................................................... 280
MAC-Based IP Assignment............................................................................................ 282
DHCP Retry Mechanism................................................................................................. 283
File Server.................................................................................................................................283
Domain Name Server............................................................................................................284
Switch Boot and Set-up Behavior in Jumpstart Mode.................................................. 284
12 Content Addressable Memory (CAM)............................................................................. 287
CAM Allocation....................................................................................................................... 287
Re-Allocating CAM for Ingress ACLs and QoS................................................................288
Re-Allocating CAM for Egress ACLs.................................................................................. 289
Testing CAM Usage for QoS Policies.................................................................................290
Displaying CAM-ACL Settings..............................................................................................291
Displaying CAM-ACL-Egress Settings................................................................................291
CAM Optimization................................................................................................................. 292
Troubleshoot CAM Profiling.......................................................................................... 292
13 Control Plane Policing (CoPP)......................................................................................... 293
Configure Control Plane Policing.......................................................................................295
Configuring CoPP for Protocols.........................................................................................295
Configuring CoPP for CPU Queues...................................................................................297
Show Commands.................................................................................................................. 298
14 Data Center Bridging (DCB).............................................................................................300
Ethernet Enhancements in Data Center Bridging.......................................................... 300
Priority-Based Flow Control.......................................................................................... 302
Enhanced Transmission Selection................................................................................303
10
Data Center Bridging Exchange Protocol (DCBx).....................................................304
Data Center Bridging in a Traffic Flow.........................................................................305
Enabling Data Center Bridging............................................................................................305
DCB Maps and its Attributes.......................................................................................... 306
Data Center Bridging: Default Configuration.................................................................. 307
Configuring Priority-Based Flow Control.........................................................................308
Configuring Lossless Queues........................................................................................309
Configuring PFC in a DCB Map...........................................................................................310
PFC Configuration Notes................................................................................................310
PFC Prerequisites and Restrictions................................................................................311
Applying a DCB Map on a Port............................................................................................ 312
Configuring PFC without a DCB Map................................................................................ 312
Configuring Lossless QueuesExample:........................................................................313
Priority-Based Flow Control Using Dynamic Buffer Method........................................315
Pause and Resume of Traffic..........................................................................................315
Buffer Sizes for Lossless or PFC Packets..................................................................... 315
Behavior of Tagged Packets.................................................................................................316
Configuration Example for DSCP and PFC Priorities...................................................... 317
Using PFC to Manage Converged Ethernet Traffic.........................................................318
Configure Enhanced Transmission Selection.................................................................. 318
ETS Prerequisites and Restrictions................................................................................318
Creating an ETS Priority Group......................................................................................318
ETS Operation with DCBx.............................................................................................. 320
Configuring Bandwidth Allocation for DCBx CIN.....................................................320
Configuring ETS in a DCB Map......................................................................................321
Hierarchical Scheduling in ETS Output Policies.............................................................. 323
Using ETS to Manage Converged Ethernet Traffic......................................................... 324
Applying DCB Policies in a Switch Stack...........................................................................324
Configure a DCBx Operation.............................................................................................. 324
DCBx Operation................................................................................................................325
DCBx Port Roles............................................................................................................... 325
DCB Configuration Exchange........................................................................................327
Configuration Source Election...................................................................................... 327
Propagation of DCB Information..................................................................................328
Auto-Detection and Manual Configuration of the DCBx Version.........................328
DCBx Example.................................................................................................................. 329
DCBx Prerequisites and Restrictions............................................................................329
Configuring DCBx............................................................................................................330
Verifying the DCB Configuration........................................................................................334
Sample DCB Configuration................................................................................................. 344
PFC and ETS Configuration Command Examples....................................................346
QoS dot1p Traffic Classification and Queue Assignment............................................. 347
11
Configuring the Dynamic Buffer Method......................................................................... 348
15 Dynamic Host Configuration Protocol (DHCP)............................................................350
DHCP Packet Format and Options.................................................................................... 350
Assign an IP Address using DHCP.......................................................................................352
Implementation Information............................................................................................... 353
Configuration Tasks...............................................................................................................354
Configure the System to be a DHCP Server.....................................................................354
Configuration Tasks.........................................................................................................355
Configuring the Server for Automatic Address Allocation...................................... 355
Specifying a Default Gateway........................................................................................356
Enabling the DHCP Server..............................................................................................357
Configure a Method of Hostname Resolution...........................................................357
Creating Manual Binding Entries...................................................................................358
Debugging the DHCP Server......................................................................................... 359
Using DHCP Clear Commands..................................................................................... 359
Configure the System to be a Relay Agent...................................................................... 360
Configure the System for User Port Stacking.................................................................. 362
Configure Secure DHCP.......................................................................................................362
Option 82...........................................................................................................................362
DHCP Snooping............................................................................................................... 363
Drop DHCP Packets on Snooped VLANs Only..........................................................365
Dynamic ARP Inspection................................................................................................ 365
Source Address Validation..............................................................................................367
Viewing the Number of SAV Dropped Packets................................................................369
Clearing the Number of SAV Dropped Packets...............................................................370
16 Equal Cost Multi-Path (ECMP)..........................................................................................371
ECMP for Flow-Based Affinity..............................................................................................371
Configuring the Hash Algorithm......................................................................................... 371
Enabling Deterministic ECMP Next Hop............................................................................371
Configuring the Hash Algorithm Seed...............................................................................372
Link Bundle Monitoring.........................................................................................................372
Managing ECMP Group Paths............................................................................................. 373
Creating an ECMP Group Bundle....................................................................................... 374
Modifying the ECMP Group Threshold............................................................................. 374
17 Fabric Services.....................................................................................................................376
Configuring Switch Mode to Fabric Services....................................................................377
Name Server............................................................................................................................378
Link State Database................................................................................................................379
Inter Switch Link (ISL)...................................................................................................... 379
12
Principal Switch Selection and Domain ID Assignment...........................................379
Route Table....................................................................................................................... 380
Zoning...................................................................................................................................... 380
Creating Zone and Adding Members...........................................................................380
Creating Zone Alias and Adding Members..................................................................381
Creating Zonesets............................................................................................................ 381
Activating a Zoneset........................................................................................................ 382
Zone Merge (within ISL)..................................................................................................382
Configuring Fabric Parameters..................................................................................... 382
Displaying the Fabric Parameters................................................................................. 383
18 FCoE Transit........................................................................................................................ 389
Fibre Channel over Ethernet................................................................................................389
Ensure Robustness in a Converged Ethernet Network................................................. 389
FIP Snooping on Ethernet Bridges......................................................................................391
FIP Snooping in a Switch Stack...........................................................................................394
Using FIP Snooping............................................................................................................... 394
Enable the FCoE Transit Feature...................................................................................394
FIP Snooping Prerequisites.............................................................................................395
Important Points to Remember.................................................................................... 395
Enabling the FCoE Transit Feature............................................................................... 396
Enable FIP Snooping on VLANs.....................................................................................397
Configure the FC-MAP Value........................................................................................ 397
Configure a Port for a Bridge-to-Bridge Link............................................................ 397
Configure a Port for a Bridge-to-FCF Link.................................................................398
Impact on Other Software Features.............................................................................398
FIP Snooping on an NPIV Proxy Gateway...................................................................399
FIP Snooping in an S5000 Stack...................................................................................399
Impact on Other Software Features.............................................................................399
FIP Snooping Restrictions.............................................................................................. 400
Configuring FIP Snooping..............................................................................................400
Displaying FIP Snooping Information.......................................................................... 401
FCoE Transit Configuration Example.................................................................................407
19 FIPS Cryptography.............................................................................................................409
Configuration Tasks.............................................................................................................. 409
Preparing the System............................................................................................................ 410
Enabling FIPS Mode............................................................................................................... 410
Generating Host-Keys........................................................................................................... 411
Monitoring FIPS Mode Status............................................................................................... 411
Disabling FIPS Mode...............................................................................................................411
13
20 Fibre Channel Interface.................................................................................................... 413
Configure Fibre Channel Interfaces................................................................................... 413
Enabling Fibre Channel Capability......................................................................................413
Configuring Fibre Channel Interfaces................................................................................414
Displaying Fibre Channel Information............................................................................... 414
Troubleshooting Fibre Channel Operation.......................................................................417
Configuring the Fibre Channel Port Group in Passthrough Ethernet Mode............. 419
Displaying Fibre Channel Port Group Mode Information............................................. 420
21 Force10 Resilient Ring Protocol (FRRP)......................................................................... 421
Protocol Overview................................................................................................................. 421
Ring Status.........................................................................................................................424
Multiple FRRP Rings......................................................................................................... 425
Important FRRP Points....................................................................................................426
Important FRRP Concepts..............................................................................................427
Implementing FRRP...............................................................................................................428
FRRP Configuration............................................................................................................... 429
Creating the FRRP Group............................................................................................... 429
Configuring the Control VLAN......................................................................................429
Configuring and Adding the Member VLANs............................................................. 431
Setting the FRRP Timers................................................................................................. 432
Clearing the FRRP Counters.......................................................................................... 432
Viewing the FRRP Configuration...................................................................................432
Viewing the FRRP Information...................................................................................... 433
Troubleshooting FRRP.......................................................................................................... 433
Configuration Checks..................................................................................................... 433
Sample Configuration and Topology................................................................................ 434
22 GARP VLAN Registration Protocol (GVRP)....................................................................436
Important Points to Remember..........................................................................................436
Configure GVRP......................................................................................................................437
Related Configuration Tasks..........................................................................................438
Enabling GVRP Globally........................................................................................................438
Enabling GVRP on a Layer 2 Interface...............................................................................438
Configure GVRP Registration.............................................................................................. 439
Configure a GARP Timer...................................................................................................... 439
23 High Availability (HA).........................................................................................................441
High Availability on Stacks....................................................................................................441
Hitless Behavior...................................................................................................................... 441
Graceful Restart......................................................................................................................442
14
Software Resiliency................................................................................................................442
System Health Monitoring..............................................................................................442
Failure and Event Logging..............................................................................................442
Trace Log...........................................................................................................................442
Core Dumps......................................................................................................................443
System Log........................................................................................................................ 443
Hot-Lock Behavior................................................................................................................ 443
Component Redundancy.....................................................................................................443
Automatic and Manual Stack Unit Failover.................................................................444
Synchronization between Management and Standby Units...................................445
Forcing an Stack Unit Failover.......................................................................................445
Specifying an Auto-Failover Limit.................................................................................445
Disabling Auto-Reboot................................................................................................... 446
Manually Synchronizing Management and Standby Units......................................446
24 Internet Group Management Protocol (IGMP)............................................................ 447
IGMP Implementation Information....................................................................................447
IGMP Protocol Overview......................................................................................................448
IGMP Version 2.................................................................................................................448
Join a Multicast Group....................................................................................................449
Leaving a Multicast Group..............................................................................................449
IGMP Version 3.................................................................................................................449
Configure IGMP......................................................................................................................453
Related Configuration Tasks..........................................................................................453
Viewing IGMP Enabled Interfaces...................................................................................... 454
Selecting an IGMP Version...................................................................................................454
Viewing IGMP Groups........................................................................................................... 455
Adjusting Timers.....................................................................................................................455
Adjusting Query and Response Timers........................................................................455
Enabling IGMP Immediate-Leave.......................................................................................456
IGMP Snooping.......................................................................................................................457
IGMP Snooping Implementation Information............................................................457
Configuring IGMP Snooping..........................................................................................457
Removing a Group-Port Association...........................................................................458
Enabling IGMP Immediate-Leave.................................................................................458
Disabling Multicast Flooding..........................................................................................459
Specifying a Port as Connected to a Multicast Router............................................ 459
Configuring the Switch as Querier...............................................................................459
Fast Convergence after MSTP Topology Changes.........................................................460
Egress Interface Selection (EIS) for HTTP and IGMP Applications..............................460
Protocol Separation......................................................................................................... 461
Enabling and Disabling Management Egress Interface Selection......................... 462
15
Handling of Management Route Configuration........................................................463
Handling of Switch-Initiated Traffic.............................................................................464
Handling of Switch-Destined Traffic........................................................................... 465
Handling of Transit Traffic (Traffic Separation)..........................................................465
Mapping of Management Applications and Traffic Type.........................................466
Behavior of Various Applications for Switch-Initiated Traffic ................................467
Behavior of Various Applications for Switch-Destined Traffic ..............................468
Interworking of EIS With Various Applications.......................................................... 469
Designating a Multicast Router Interface..........................................................................470
25 Interfaces............................................................................................................................. 471
Basic Interface Configuration.............................................................................................. 471
Advanced Interface Configuration......................................................................................471
Interface Types....................................................................................................................... 472
View Basic Interface Information........................................................................................473
Resetting an Interface to its Factory Default State..........................................................475
Enabling Energy Efficient Ethernet.....................................................................................475
View EEE Information............................................................................................................476
Clear EEE Counters................................................................................................................481
Enabling a Physical Interface...............................................................................................482
Physical Interfaces................................................................................................................. 482
Configuration Task List for Physical Interfaces..........................................................482
Overview of Layer Modes...............................................................................................483
Configuring Layer 2 (Data Link) Mode.........................................................................483
Configuring Layer 2 (Interface) Mode......................................................................... 484
Configuring Layer 3 (Network) Mode..........................................................................484
Configuring Layer 3 (Interface) Mode..........................................................................485
Egress Interface Selection (EIS)...........................................................................................485
Important Points to Remember....................................................................................486
Configuring EIS.................................................................................................................486
Management Interfaces........................................................................................................486
Configuring Management Interfaces...........................................................................486
Configuring a Management Interface on an Ethernet Port....................................488
VLAN Interfaces......................................................................................................................489
Loopback Interfaces..............................................................................................................490
Null Interfaces........................................................................................................................ 490
Port Channel Interfaces........................................................................................................ 491
Port Channel Definition and Standards....................................................................... 491
Port Channel Benefits......................................................................................................491
Port Channel Implementation.......................................................................................491
Interfaces in Port Channels............................................................................................492
Configuration Tasks for Port Channel Interfaces......................................................493
16
Creating a Port Channel................................................................................................. 493
Adding a Physical Interface to a Port Channel.......................................................... 493
Reassigning an Interface to a New Port Channel..................................................... 495
Configuring the Minimum Oper Up Links in a Port Channel................................. 496
Adding or Removing a Port Channel from a VLAN...................................................497
Assigning an IP Address to a Port Channel................................................................ 498
Deleting or Disabling a Port Channel.......................................................................... 498
Load Balancing Through Port Channels.....................................................................499
Changing the Hash Algorithm.......................................................................................499
Bulk Configuration................................................................................................................ 500
Interface Range................................................................................................................ 500
Bulk Configuration Examples.........................................................................................501
Defining Interface Range Macros.......................................................................................502
Define the Interface Range............................................................................................ 503
Choosing an Interface-Range Macro.......................................................................... 503
Monitoring and Maintaining Interfaces............................................................................. 503
Maintenance Using TDR.................................................................................................504
Splitting QSFP Ports to SFP+ Ports.....................................................................................505
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..........................................506
Important Points to Remember....................................................................................506
Example Scenarios........................................................................................................... 507
Configuring wavelength for 10–Gigabit SFP+ optics..................................................... 511
Link Dampening...................................................................................................................... 511
Important Points to Remember..................................................................................... 511
Enabling Link Dampening............................................................................................... 512
Link Bundle Monitoring......................................................................................................... 513
Using Ethernet Pause Frames for Flow Control...............................................................514
Enabling Pause Frames....................................................................................................515
Configure the MTU Size on an Interface...........................................................................515
Port-Pipes................................................................................................................................ 516
Auto-Negotiation on Ethernet Interfaces..........................................................................517
Setting the Speed and Duplex Mode of Ethernet Interfaces................................... 517
Set Auto-Negotiation Options.......................................................................................519
View Advanced Interface Information...............................................................................520
Configuring the Interface Sampling Size.................................................................... 520
Dynamic Counters................................................................................................................. 521
Clearing Interface Counters...........................................................................................522
26 Internet Protocol Security (IPSec).................................................................................. 523
Configuring IPSec ................................................................................................................. 524
27 IPv4 Routing........................................................................................................................525
17
IP Addresses............................................................................................................................ 526
Implementation Information......................................................................................... 526
Configuration Tasks for IP Addresses................................................................................ 526
Assigning IP Addresses to an Interface..............................................................................527
Configuring Static Routes.................................................................................................... 528
Configure Static Routes for the Management Interface............................................... 529
IPv4 Path MTU Discovery Overview...................................................................................529
Using the Configured Source IP Address in ICMP Messages....................................... 530
Configuring the ICMP Source Interface......................................................................530
Configuring the Duration to Establish a TCP Connection.............................................531
Enabling Directed Broadcast................................................................................................531
Resolution of Host Names................................................................................................... 532
Enabling Dynamic Resolution of Host Names.................................................................532
Specifying the Local System Domain and a List of Domains........................................533
Configuring DNS with Traceroute......................................................................................533
ARP............................................................................................................................................534
Configuration Tasks for ARP................................................................................................534
Configuring Static ARP Entries............................................................................................ 535
Enabling Proxy ARP................................................................................................................535
Clearing ARP Cache...............................................................................................................536
ARP Learning via Gratuitous ARP........................................................................................536
Enabling ARP Learning via Gratuitous ARP....................................................................... 537
ARP Learning via ARP Request.............................................................................................537
Configuring ARP Retries....................................................................................................... 538
ICMP..........................................................................................................................................539
Configuration Tasks for ICMP............................................................................................. 539
Enabling ICMP Unreachable Messages............................................................................. 539
UDP Helper............................................................................................................................. 540
Configure UDP Helper....................................................................................................540
Important Points to Remember....................................................................................540
Enabling UDP Helper............................................................................................................ 540
Configuring a Broadcast Address........................................................................................541
Configurations Using UDP Helper...................................................................................... 541
UDP Helper with Broadcast-All Addresses.......................................................................542
UDP Helper with Subnet Broadcast Addresses............................................................... 543
UDP Helper with Configured Broadcast Addresses....................................................... 543
UDP Helper with No Configured Broadcast Addresses.................................................544
Troubleshooting UDP Helper..............................................................................................544
28 IPv6 Routing....................................................................................................................... 546
Protocol Overview.................................................................................................................546
Extended Address Space................................................................................................ 546
18
Stateless Autoconfiguration...........................................................................................546
IPv6 Headers......................................................................................................................547
IPv6 Header Fields............................................................................................................548
Extension Header Fields..................................................................................................550
Addressing..........................................................................................................................551
Implementing IPv6 with Dell Networking OS.................................................................. 552
ICMPv6................................................................................................................................552
Path MTU Discovery........................................................................................................ 553
IPv6 Neighbor Discovery................................................................................................ 553
Secure Shell (SSH) Over an IPv6 Transport.................................................................554
Configuration Tasks for IPv6................................................................................................555
Adjusting Your CAM-Profile........................................................................................... 555
Assigning an IPv6 Address to an Interface..................................................................556
Assigning a Static IPv6 Route.........................................................................................556
Configuring Telnet with IPv6......................................................................................... 557
SNMP over IPv6.................................................................................................................557
Showing IPv6 Information..............................................................................................558
Showing an IPv6 Interface..............................................................................................558
Showing IPv6 Routes.......................................................................................................559
Showing the Running-Configuration for an Interface.............................................560
Clearing IPv6 Routes........................................................................................................561
Configuring IPv6 RA Guard.................................................................................................. 561
Configuring IPv6 RA Guard on an Interface...............................................................563
Monitoring IPv6 RA Guard..............................................................................................564
29 iSCSI Optimization.............................................................................................................565
iSCSI Optimization Overview...............................................................................................565
Monitoring iSCSI Traffic Flows...................................................................................... 566
Application of Quality of Service to iSCSI Traffic Flows...........................................567
Information Monitored in iSCSI Traffic Flows............................................................ 567
Detection and Auto-Configuration for Dell EqualLogic Arrays............................. 568
Configuring Detection and Ports for Dell Compellent Arrays................................568
Enable and Disable iSCSI Optimization.......................................................................569
Default iSCSI Optimization Values......................................................................................570
iSCSI Optimization Prerequisites........................................................................................ 570
Configuring iSCSI Optimization..........................................................................................570
Displaying iSCSI Optimization Information...................................................................... 572
30 Intermediate System to Intermediate System..............................................................574
IS-IS Protocol Overview........................................................................................................574
IS-IS Addressing......................................................................................................................575
Multi-Topology IS-IS............................................................................................................. 575
19
Transition Mode................................................................................................................576
Interface Support..............................................................................................................576
Adjacencies........................................................................................................................576
Graceful Restart...................................................................................................................... 577
Timers..................................................................................................................................577
Implementation Information................................................................................................577
Configuration Information................................................................................................... 578
Configuration Tasks for IS-IS......................................................................................... 579
Configuring the Distance of a Route........................................................................... 588
Changing the IS-Type..................................................................................................... 588
IS-IS Metric Styles...................................................................................................................593
Configure Metric Values.......................................................................................................594
Maximum Values in the Routing Table........................................................................594
Change the IS-IS Metric Style in One Level Only......................................................594
Leaks from One Level to Another.................................................................................596
Sample Configurations..........................................................................................................597
31 Link Aggregation Control Protocol (LACP)...................................................................600
Introduction to Dynamic LAGs and LACP........................................................................600
Important Points to Remember....................................................................................600
LACP Modes...................................................................................................................... 601
Configuring LACP Commands...................................................................................... 601
LACP Configuration Tasks................................................................................................... 602
Creating a LAG..................................................................................................................602
Configuring the LAG Interfaces as Dynamic..............................................................603
Setting the LACP Long Timeout................................................................................... 603
Monitoring and Debugging LACP................................................................................ 604
Shared LAG State Tracking.................................................................................................. 604
Configuring Shared LAG State Tracking......................................................................605
Important Points about Shared LAG State Tracking.................................................607
LACP Basic Configuration Example................................................................................... 607
Configure a LAG on ALPHA........................................................................................... 607
32 Layer 2.................................................................................................................................. 616
Manage the MAC Address Table......................................................................................... 616
Clearing the MAC Address Table...................................................................................616
Setting the Aging Time for Dynamic Entries...............................................................616
Configuring a Static MAC Address................................................................................ 617
Displaying the MAC Address Table............................................................................... 617
MAC Learning Limit................................................................................................................617
mac learning-limit Dynamic.......................................................................................... 618
mac learning-limit mac-address-sticky...................................................................... 618
20
/